syzbot


possible deadlock in sock_map_delete_elem

Status: upstream: reported C repro on 2024/03/18 16:03
Subsystems: bpf net
[Documentation on labels]
Reported-by: syzbot+4ac2fe2b496abca8fa4b@syzkaller.appspotmail.com
First crash: 789d, last: 702d
✨ AI Jobs (1)
ID Workflow Result Correct Bug Created Started Finished Revision Error
20832117-7bb1-41c3-9856-74710844f1a2 assessment-security 💥 possible deadlock in sock_map_delete_elem 2026/05/12 04:03 2026/05/12 04:36 2026/05/12 05:00 d168f2605715ec7b7ab6840d636f69c758e424d9 failed to run ["make" "KERNELVERSION=syzkaller" "KERNELRELEASE=syzkaller" "LOCALVERSION=-syzkaller" "-j" "32" "ARCH=x86_64" "CC=ccache clang" "LD=ld.lld" "O=/app/workdir/cache/build/3a89755edb5a6877e0d2c4ade8459ca9255b63f2" "-s" "bzImage" "compile_commands.json"]: exit status 2 Root cause: drivers/nvme/target/fc.c:151:2: warning: 'counted_by' should not be applied to an array with element of unknown size because 'struct nvmet_fc_fcp_iod' is a struct type with a flexible array member. This will be an error in a future compiler version [-Wbounds-safety-counted-by-elt-type-unknown-size] ld.lld: error: undefined symbol: wcslen * * Restart config... * * * General architecture-dependent options * Kprobes (KPROBES) [N/y/?] n Optimize very unlikely/likely branches (JUMP_LABEL) [Y/n/?] y Static key selftest (STATIC_KEYS_SELFTEST) [N/y/?] n Static call selftest (STATIC_CALL_SELFTEST) [N/y/?] n Enable seccomp to safely execute untrusted bytecode (SECCOMP) [Y/n/?] y Show seccomp filter cache status in /proc/pid/seccomp_cache (SECCOMP_CACHE_DEBUG) [N/y/?] n Link Time Optimization (LTO) > 1. None (LTO_NONE) choice[1]: 1 Use Clang's Control Flow Integrity (CFI) (CFI_CLANG) [N/y/?] (NEW) Error in reading or end of file. Number of bits to use for ASLR of mmap base address (ARCH_MMAP_RND_BITS) [28] 28 Number of bits to use for ASLR of mmap base address for compatible applications (ARCH_MMAP_RND_COMPAT_BITS) [8] 8 MMU page size > 1. 4KiB pages (PAGE_SIZE_4KB) choice[1]: 1 Provide system calls for 32-bit time_t (COMPAT_32BIT_TIME) [Y/n/?] y Use a virtually-mapped stack (VMAP_STACK) [Y/n/?] y Support for randomizing kernel stack offset on syscall entry (RANDOMIZE_KSTACK_OFFSET) [Y/n/?] y Default state of kernel stack offset randomization (RANDOMIZE_KSTACK_OFFSET_DEFAULT) [N/y/?] n Locking event counts collection (LOCK_EVENT_COUNTS) [N/y/?] n * * Memory initialization * Initialize kernel stack variables at function entry 1. no automatic stack variable initialization (weakest) (INIT_STACK_NONE) 2. pattern-init everything (strongest) (INIT_STACK_ALL_PATTERN) > 3. zero-init everything (strongest and safest) (INIT_STACK_ALL_ZERO) choice[1-3?]: 3 Enable heap memory zeroing on allocation by default (INIT_ON_ALLOC_DEFAULT_ON) [Y/n/?] y Enable heap memory zeroing on free by default (INIT_ON_FREE_DEFAULT_ON) [N/y/?] n Enable register zeroing on function exit (ZERO_CALL_USED_REGS) [N/y/?] (NEW) Error in reading or end of file. * * Kernel hardening options * Randomize layout of sensitive kernel structures > 1. Disable structure layout randomization (RANDSTRUCT_NONE) 2. Fully randomize structure layout (RANDSTRUCT_FULL) (NEW) choice[1-2?]: Error in reading or end of file. * * Compile-time checks and compiler options * Debug information 1. Disable debug information (DEBUG_INFO_NONE) 2. Rely on the toolchain's implicit default DWARF version (DEBUG_INFO_DWARF_TOOLCHAIN_DEFAULT) > 3. Generate DWARF Version 4 debuginfo (DEBUG_INFO_DWARF4) 4. Generate DWARF Version 5 debuginfo (DEBUG_INFO_DWARF5) choice[1-4?]: 3 Reduce debugging information (DEBUG_INFO_REDUCED) [N/y/?] n Compressed Debug information > 1. Don't compress debug information (DEBUG_INFO_COMPRESSED_NONE) 2. Compress debugging information with zlib (DEBUG_INFO_COMPRESSED_ZLIB) 3. Compress debugging information with zstd (DEBUG_INFO_COMPRESSED_ZSTD) (NEW) choice[1-3?]: Error in reading or end of file. Produce split debuginfo in .dwo files (DEBUG_INFO_SPLIT) [N/y/?] n Generate BTF type information (DEBUG_INFO_BTF) [N/y/?] n Provide GDB scripts for kernel debugging (GDB_SCRIPTS) [N/y/?] n Warn for stack frames larger than (FRAME_WARN) [2048] 2048 Strip assembler-generated symbols during link (STRIP_ASM_SYMS) [N/y/?] n Install uapi headers to usr/include (HEADERS_INSTALL) [N/y/?] n Make section mismatch errors non-fatal (SECTION_MISMATCH_WARN_ONLY) [Y/n/?] y Force all function address 64B aligned (DEBUG_FORCE_FUNCTION_ALIGN_64B) [N/y/?] n Generate vmlinux.map file when linking (VMLINUX_MAP) [N/y/?] n Force weak per-cpu definitions (DEBUG_FORCE_WEAK_PER_CPU) [N/y/?] n In file
Cause bisection: failed (error log, bisect log)
  
Fix bisection: fixed by (bisect log) :
commit 98e948fb60d41447fd8d2d0c3b8637fc6b6dc26d
Author: Jakub Sitnicki <jakub@cloudflare.com>
Date: Mon May 27 11:20:07 2024 +0000

  bpf: Allow delete from sockmap/sockhash only if update is allowed

  
Discussions (4)
Title Replies (including bot) Last reply
[syzbot] [bpf?] [net?] possible deadlock in sock_map_delete_elem 0 (3) 2024/07/18 09:25
[syzbot] Monthly bpf report (Jun 2024) 0 (1) 2024/06/12 22:41
[syzbot] Monthly net report (May 2024) 0 (1) 2024/05/31 06:48
[syzbot] Monthly bpf report (May 2024) 0 (1) 2024/05/12 18:21
Similar bugs (2)
Kernel Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-5.15 possible deadlock in sock_map_delete_elem origin:upstream 4 C error 99 696d 783d 0/3 upstream: reported C repro on 2024/03/21 17:46
linux-6.1 possible deadlock in sock_map_delete_elem origin:upstream missing-backport 4 C done 79 701d 767d 0/3 upstream: reported C repro on 2024/04/06 16:22
Last patch testing requests (10)
Created Duration User Patch Repo Result
2026/03/20 11:30 25m retest repro net-next report log
2026/03/20 11:30 16m retest repro net-next report log
2026/03/19 10:54 7h53m retest repro net-next error
2026/03/19 08:41 17m retest repro net-next report log
2026/03/19 05:30 17m retest repro net-next report log
2026/03/18 23:56 18m retest repro net-next report log
2026/03/18 21:39 17m retest repro net report log
2026/03/18 04:05 43m retest repro bpf-next report log
2026/03/17 13:42 15m retest repro bpf-next report log
2026/01/08 15:04 19m retest repro net-next report log

Sample crash report:
============================================
WARNING: possible recursive locking detected
6.9.0-rc7-syzkaller-00113-ga2c78977950d #0 Not tainted
--------------------------------------------
syz-executor192/5090 is trying to acquire lock:
ffff888022dac200 (&stab->lock){+...}-{2:2}, at: spin_lock_bh include/linux/spinlock.h:356 [inline]
ffff888022dac200 (&stab->lock){+...}-{2:2}, at: __sock_map_delete net/core/sock_map.c:417 [inline]
ffff888022dac200 (&stab->lock){+...}-{2:2}, at: sock_map_delete_elem+0x175/0x250 net/core/sock_map.c:449

but task is already holding lock:
ffff888022daba00 (&stab->lock){+...}-{2:2}, at: spin_lock_bh include/linux/spinlock.h:356 [inline]
ffff888022daba00 (&stab->lock){+...}-{2:2}, at: __sock_map_delete net/core/sock_map.c:417 [inline]
ffff888022daba00 (&stab->lock){+...}-{2:2}, at: sock_map_delete_elem+0x175/0x250 net/core/sock_map.c:449

other info that might help us debug this:
 Possible unsafe locking scenario:

       CPU0
       ----
  lock(&stab->lock);
  lock(&stab->lock);

 *** DEADLOCK ***

 May be due to missing lock nesting notation

4 locks held by syz-executor192/5090:
 #0: ffffffff8e334da0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:329 [inline]
 #0: ffffffff8e334da0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:781 [inline]
 #0: ffffffff8e334da0 (rcu_read_lock){....}-{1:2}, at: __bpf_trace_run kernel/trace/bpf_trace.c:2380 [inline]
 #0: ffffffff8e334da0 (rcu_read_lock){....}-{1:2}, at: bpf_trace_run2+0x114/0x420 kernel/trace/bpf_trace.c:2420
 #1: ffff888022daba00 (&stab->lock){+...}-{2:2}, at: spin_lock_bh include/linux/spinlock.h:356 [inline]
 #1: ffff888022daba00 (&stab->lock){+...}-{2:2}, at: __sock_map_delete net/core/sock_map.c:417 [inline]
 #1: ffff888022daba00 (&stab->lock){+...}-{2:2}, at: sock_map_delete_elem+0x175/0x250 net/core/sock_map.c:449
 #2: ffff88802de86290 (&psock->link_lock){+...}-{2:2}, at: spin_lock_bh include/linux/spinlock.h:356 [inline]
 #2: ffff88802de86290 (&psock->link_lock){+...}-{2:2}, at: sock_map_del_link net/core/sock_map.c:145 [inline]
 #2: ffff88802de86290 (&psock->link_lock){+...}-{2:2}, at: sock_map_unref+0xcc/0x5e0 net/core/sock_map.c:180
 #3: ffffffff8e334da0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:329 [inline]
 #3: ffffffff8e334da0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:781 [inline]
 #3: ffffffff8e334da0 (rcu_read_lock){....}-{1:2}, at: __bpf_trace_run kernel/trace/bpf_trace.c:2380 [inline]
 #3: ffffffff8e334da0 (rcu_read_lock){....}-{1:2}, at: bpf_trace_run2+0x114/0x420 kernel/trace/bpf_trace.c:2420

stack backtrace:
CPU: 1 PID: 5090 Comm: syz-executor192 Not tainted 6.9.0-rc7-syzkaller-00113-ga2c78977950d #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114
 check_deadlock kernel/locking/lockdep.c:3062 [inline]
 validate_chain+0x15c1/0x58e0 kernel/locking/lockdep.c:3856
 __lock_acquire+0x1346/0x1fd0 kernel/locking/lockdep.c:5137
 lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline]
 _raw_spin_lock_bh+0x35/0x50 kernel/locking/spinlock.c:178
 spin_lock_bh include/linux/spinlock.h:356 [inline]
 __sock_map_delete net/core/sock_map.c:417 [inline]
 sock_map_delete_elem+0x175/0x250 net/core/sock_map.c:449
 bpf_prog_2c29ac5cdc6b1842+0x42/0x46
 bpf_dispatcher_nop_func include/linux/bpf.h:1234 [inline]
 __bpf_prog_run include/linux/filter.h:657 [inline]
 bpf_prog_run include/linux/filter.h:664 [inline]
 __bpf_trace_run kernel/trace/bpf_trace.c:2381 [inline]
 bpf_trace_run2+0x204/0x420 kernel/trace/bpf_trace.c:2420
 __traceiter_kfree+0x2b/0x50 include/trace/events/kmem.h:94
 trace_kfree include/trace/events/kmem.h:94 [inline]
 kfree+0x2bd/0x3b0 mm/slub.c:4383
 sk_psock_free_link include/linux/skmsg.h:421 [inline]
 sock_map_del_link net/core/sock_map.c:158 [inline]
 sock_map_unref+0x3ac/0x5e0 net/core/sock_map.c:180
 __sock_map_delete net/core/sock_map.c:423 [inline]
 sock_map_delete_elem+0x1a2/0x250 net/core/sock_map.c:449
 bpf_prog_2c29ac5cdc6b1842+0x42/0x46
 bpf_dispatcher_nop_func include/linux/bpf.h:1234 [inline]
 __bpf_prog_run include/linux/filter.h:657 [inline]
 bpf_prog_run include/linux/filter.h:664 [inline]
 __bpf_trace_run kernel/trace/bpf_trace.c:2381 [inline]
 bpf_trace_run2+0x204/0x420 kernel/trace/bpf_trace.c:2420
 __traceiter_kfree+0x2b/0x50 include/trace/events/kmem.h:94
 trace_kfree include/trace/events/kmem.h:94 [inline]
 kfree+0x2bd/0x3b0 mm/slub.c:4383
 map_update_elem+0x5ca/0x6f0 kernel/bpf/syscall.c:1645
 __sys_bpf+0x76f/0x810 kernel/bpf/syscall.c:5648
 __do_sys_bpf kernel/bpf/syscall.c:5767 [inline]
 __se_sys_bpf kernel/bpf/syscall.c:5765 [inline]
 __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5765
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f2b5b200ee9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 c1 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fffec93b7b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2b5b200ee9
RDX: 0000000000000020 RSI: 0000000020000500 RDI: 0000000000000002
RBP: 0000000000000000 R08: 00000000000000a0 R09: 00000000000000a0
R10: 00000000000000a0 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
 </TASK>

Crashes (869):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/05/10 20:51 net a2c78977950d f7c35481 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/15 04:34 net-next 654de42f3fc6 fdb4c10c .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/14 14:16 bpf-next ba39486d2c43 fdb4c10c .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/12 20:04 net-next cddd2dc6390b 9026e142 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/12 17:34 net-next cddd2dc6390b 9026e142 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/11 20:52 net-next cddd2dc6390b 9026e142 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/10 20:19 net-next 383eed2de529 f7c35481 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/10 13:07 net-next 383eed2de529 de979bc2 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/09 09:52 bpf-next e612b5c1d3ee 20bf80e1 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/24 13:48 bpf 4b377b4868ef 8f98448e .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/24 07:19 bpf 4b377b4868ef 8f98448e .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/23 02:25 bpf 4b377b4868ef 4d098039 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/19 07:24 net 4b377b4868ef c0f1611a .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/11 14:31 net 4c639b6a7b9d 9026e142 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/03 04:53 net 78cfe547607a ddfc15a1 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/02 03:49 bpf 3e9bc0472b91 3ba885bc .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce possible deadlock in sock_map_delete_elem
2024/04/30 23:45 bpf 3e9bc0472b91 9e0e6af1 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce possible deadlock in sock_map_delete_elem
2024/04/30 23:10 net ba1cb99b559e 9e0e6af1 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce possible deadlock in sock_map_delete_elem
2024/04/30 17:14 net ba1cb99b559e 9e0e6af1 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce possible deadlock in sock_map_delete_elem
2024/04/30 01:12 net ba1cb99b559e 27e33c58 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/22 20:21 bpf-next 6f130e4d4a5f 4d098039 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/22 07:37 bpf-next 6f130e4d4a5f 1014eca7 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/21 23:26 net-next 4b377b4868ef 1014eca7 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/16 10:53 net-next 1b294a1f3561 ef5d53ed .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/15 20:50 bpf-next 5c1672705a1a 0b3dad46 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/07 20:05 bpf-next 329a6720a3eb cb2dcc0e .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/07 03:33 bpf-next 8e6d9ae2e09f c035c6de .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/05 09:24 bpf-next a9e7715ce8b3 610f2a54 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/05 06:36 bpf-next a9e7715ce8b3 610f2a54 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/05 01:35 bpf-next a9e7715ce8b3 610f2a54 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/04 15:49 bpf-next a9e7715ce8b3 610f2a54 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/04 05:44 net-next 5829614a7b3b 610f2a54 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/04 02:50 bpf-next a9e7715ce8b3 610f2a54 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/07 23:42 bpf-next 329a6720a3eb cb2dcc0e .config console log report syz [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/21 12:15 upstream 70ec81c2e2b4 c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in sock_map_delete_elem
2024/05/19 06:29 upstream 0450d2083be6 c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in sock_map_delete_elem
2024/05/28 05:23 net 52a2f0608366 f550015e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/28 05:19 net 52a2f0608366 f550015e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/27 15:49 bpf 95348e463eab a10a183e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce possible deadlock in sock_map_delete_elem
2024/03/15 21:01 bpf aae08491b943 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/11 01:52 bpf-next f85af9d955ac 048c640a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/10 22:08 bpf-next f85af9d955ac 048c640a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/09 21:57 bpf-next f85af9d955ac 82c05ab8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/09 19:49 bpf-next f85af9d955ac 82c05ab8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/09 03:27 bpf-next f85af9d955ac 82c05ab8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/08 10:49 bpf-next f85af9d955ac 82c05ab8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/07 13:53 bpf-next f85af9d955ac 121701b6 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/07 11:15 bpf-next f85af9d955ac 121701b6 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/07 08:31 bpf-next f85af9d955ac 121701b6 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/05 17:41 bpf-next 898ac74c5b5f e1e2c66e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/05 16:37 bpf-next 898ac74c5b5f e1e2c66e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/05 08:37 bpf-next 61ce0ea7591f e1e2c66e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/04 20:23 bpf-next 49df0019f367 a1feae05 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/04 16:35 bpf-next 49df0019f367 a1feae05 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/04 15:17 bpf-next 49df0019f367 a1feae05 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/04 10:31 bpf-next 49df0019f367 a1feae05 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/04 05:20 bpf-next 49df0019f367 a1feae05 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/04 03:07 bpf-next 96a27ee76f0e 0aba2352 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/04 00:11 bpf-next 96a27ee76f0e 0aba2352 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/03 21:23 bpf-next 96a27ee76f0e 0aba2352 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/03 19:07 bpf-next 96a27ee76f0e 0aba2352 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/03 15:04 bpf-next 531876c80004 0aba2352 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/03 13:07 bpf-next 531876c80004 0aba2352 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/03 10:49 bpf-next 531876c80004 0aba2352 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/03 06:13 bpf-next 531876c80004 3113787f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/03 05:01 bpf-next 531876c80004 3113787f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/03 03:30 bpf-next 531876c80004 3113787f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/02 23:56 bpf-next 531876c80004 3113787f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/02 20:06 bpf-next 531876c80004 3113787f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/02 12:18 bpf-next 531876c80004 3113787f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/02 07:13 bpf-next 531876c80004 3113787f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/01 23:52 bpf-next 531876c80004 3113787f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/01 21:15 bpf-next 531876c80004 3113787f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/01 19:54 bpf-next 531876c80004 3113787f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/01 18:01 bpf-next 531876c80004 3113787f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/01 14:43 bpf-next 531876c80004 3113787f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/01 10:41 bpf-next 531876c80004 3113787f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/01 08:20 bpf-next 531876c80004 3113787f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/06/01 00:31 net-next ccf23c916ca3 3113787f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/31 22:23 bpf-next 3f8fde319524 3113787f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/31 20:47 net-next ccf23c916ca3 3113787f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/31 19:18 bpf-next 3f8fde319524 3113787f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/31 17:37 bpf-next 3f8fde319524 3113787f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/31 14:01 bpf-next fbe3e8473f39 34889ee3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/31 10:25 bpf-next fbe3e8473f39 34889ee3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/31 07:35 net-next 030fae30f059 34889ee3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/31 01:47 bpf-next fbe3e8473f39 34889ee3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/29 09:30 net-next 93bda33046e7 34889ee3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/29 05:04 bpf-next eb4e7726279a 34889ee3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/28 08:27 bpf-next e245ef8a0b06 f550015e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce possible deadlock in sock_map_delete_elem
2024/05/25 01:59 linux-next 3689b0ef08b7 a10a183e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in sock_map_delete_elem
* Struck through repros no longer work on HEAD.